Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
FungiCap
Jul 23, 2007

Let's all just calm down and put on our thinking caps.
The person who proudly held the mantle of “mean security person who always says ‘no’” left and now I have to be that person instead and I hate it.

Don’t work in cyber security if you want to be friends with anyone else outside of security team is what I’m saying.

Adbot
ADBOT LOVES YOU

Saukkis
May 16, 2003

Unless I'm on the inside curve pointing straight at oncoming traffic the high beams stay on and I laugh at your puny protest flashes.
I am Most Important Man. Most Important Man in the World.

SlowBloke posted:

https://learn.microsoft.com/en-us/purview/communication-compliance

And as all most interesting features in 365, it only works properly in English.

Finally we have a metric to show that ITsec is doing their work!

spankmeister
Jun 15, 2008






Just pivot to red teaming, you get to break stuff and you aren't the one that has to fix it.

Best part is next year's pentest where they haven't fixed anything because they "accepted the risk" and you just stroll your way to DA the same way you did last time. (This is fun the first time but gets really old the third or fourth time actually)

Reporting really sucks tho

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

FungiCap posted:

The person who proudly held the mantle of “mean security person who always says ‘no’” left and now I have to be that person instead and I hate it.

Don’t work in cyber security if you want to be friends with anyone else outside of security team is what I’m saying.

Easiest way to dispel that is just suggest alternatives or make them own the risks.

Don't say "No", say "Well, why dont you do it this way." Give them outs or enough rope to hang themselves

The Fool
Oct 16, 2003


Yeah, you can get a lot of mileage out of "Why do you need this?" followed up with a "Let's try it this way instead"

But you still get

Sickening posted:

Apparently HR reached out to me today because another employee cursed my name so many times in the previous days that they set off teams communication policies that sent alerts to HR. They tripped the "physical violence" filters. My sin? Created azure security policies (now called initiatives) that created guardrails like "can't create a public accessible storage account in x subscriptions". I was also shocked to find that the storage account they wanted to create as public was because networking is too hard and not because it was actually required. Sucks to suck I guess.

I also sat in an executive security leadership meeting where I was told the company needs to create a culture of security. Nobody could define what that meant, but everyone agreed we needed it. There was also mixed signals about wanting security training to be a happy thing while also punishing people who fail phishing simulations, so lets just say execs are still dumb sociopaths who don't understand human emotions.

people like the subject of this post and there's not a lot you can do about it.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Yup, won't always be a win, but you'll be viewed by most as someone willing to listen and align with the teams.

Achmed Jones
Oct 16, 2004



spankmeister posted:

Best part is next year's pentest where they haven't fixed anything because they "accepted the risk" and you just stroll your way to DA the same way you did last time. (This is fun the first time but gets really old the third or fourth time actually)

everybody should red team for a while but boy howdy i would not want to do that in perpetuity. there are of course some orgs that could keep it interesting over time, but they're few and far between

spankmeister
Jun 15, 2008






It's fun but like many infosec roles its good to transition out of after a while yeah

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Sickening posted:

Apparently HR reached out to me today because another employee cursed my name so many times in the previous days that they set off teams communication policies that sent alerts to HR.

Do you get a pin, or a badge to sew onto your jacket? “I make you this mad at me so that our (customers’) lawyers don’t get that mad at you.”

bolind
Jun 19, 2005



Pillbug

Quite some time back I asked about RFID cloning tools and the Proxmark3 v3 came up. I finally decided to pull the trigger, and lo and behold it's sold out and appears to be discontinued.

What's the recommendation these days? Budget is around USD100.

evil_bunnY
Apr 2, 2003

The Fool posted:

people like the subject of this post and there's not a lot you can do about it.
the best and only trick you need is to stop giving a single gently caress and get that bag. Weaponized incompetence in management is not yours to fix.

Sickening posted:

Apparently HR reached out to me today because another employee cursed my name so many times in the previous days that they set off teams communication policies that sent alerts to HR. They tripped the "physical violence" filters.
In a just world this is what challenge coins are for.

Achmed Jones
Oct 16, 2004



bolind posted:

Quite some time back I asked about RFID cloning tools and the Proxmark3 v3 came up. I finally decided to pull the trigger, and lo and behold it's sold out and appears to be discontinued.

What's the recommendation these days? Budget is around USD100.

go to aliexpress and buy a clone.

evil_bunnY
Apr 2, 2003

MustardFacial posted:

I applied for Cybersec Analyst position and got it (been a sysadmin for years and always security-first, but never actually done an infosec job). I was hyped for it from the beginning but then when my future manager called me to tell me that I got it and what to expect he mentioned that I'd be enrolled in a couple SANS courses, some SEIM training, I'd have to get my CISSP at some point, what my colleagues specialize in and mentioned that one of them has a SANS Challenge Coin.

Since then imposter syndrome has hit hard and now I'm wondering if I am even capable of doing this to their level. I'm 2 years younger than the manager and at least 5 years older than everyone else on my team. I haven't even started and I'm already feeling behind an unable to catch up. There is so much stuff I don't know how to do, and even more that I only have a general understanding of.
The fact you're willing to admit your supposed incompetence already places you at an advantage. It's a bunch of learning but you'll be fine.

HellaSecure
Aug 12, 2023

Sickening posted:

I also sat in an executive security leadership meeting where I was told the company needs to create a culture of security. Nobody could define what that meant, but everyone agreed we needed it. There was also mixed signals about wanting security training to be a happy thing while also punishing people who fail phishing simulations, so lets just say execs are still dumb sociopaths who don't understand human emotions.

Phishing simulations seriously need to die in a fire. They don’t help security awareness while also being ethically questionable.

Major Ryan
May 11, 2008

Completely blank

HellaSecure posted:

Phishing simulations seriously need to die in a fire. They don’t help security awareness while also being ethically questionable.

We've done phishing campaigns in the past and I've always tried to keep the content generic and never 'gotcha' people. And then follow that up with a whole bunch of positive reinforcement on what the campaign was trying to achieve. I'd say it's been worthwhile.

Now though I've got a meeting booked in with some clients about a joint campaign and the entire tone from the setup so far has been about how we can make these stupid idiots click on just about anything. This is going to be a hell of meeting as I try to explain why treating your staff as if they're destructive five year olds might not be the best long term strategy. Or why the tone of suggesting "company pay rise" or "extra holiday" only to say "Not Really, Suckers, and also you're stupid and here's some mandatory remedial training" might not go over as well as you think it will.

I don't think the problem is phishing simulations, I think it's 'leaders' with zero empathy.

mllaneza
Apr 28, 2007

Veteran, Bermuda Triangle Expeditionary Force, 1993-1952




I'm in a weird place as far as relationships with Security go.

The product owner for Security Governance gave me PowerShell code to disable the bad kind of TeamViewer that can dial in whenever a vendor wants to touch one of our lab systems. They won't unblock downloads.teamviewer.com, but we can support it in labs where it's part of the support contract for a $BIGBUCKS instrument.

The firewall people will deep dive in Splunk to help us diagnose weird network issues, screensharing Splunk sessions live while they're working on it. I have easy catalogue items to update firewall rules or exclude an external host from SSL MITM fuckery with certificates.

The people who manage our antivirus solutions will spend hours with us watching the consoles live while we're trying to keep fireeye from breaking janky vendor software. These people are in Europe and about 9 time zones ahead of us, but they'll go live with West Coast US people. I talked them in to creating a Lab Systems exceptions group, and on top of that gave them a list of AD OUs that only contained lab machines to automatically add our stuff to the group with the exceptions. They open tickets with the vendor when AV goes wild on the stuff I support. I send these people internal recognition awards a few times a year.

I expected all of these groups to default to "no". They don't, they want the work to get done, and they sincerely believe that they're here to add a layer of safety to the science. I'm blessed and I know it.

BonHair
Apr 28, 2007

Major Ryan posted:

We've done phishing campaigns in the past and I've always tried to keep the content generic and never 'gotcha' people. And then follow that up with a whole bunch of positive reinforcement on what the campaign was trying to achieve. I'd say it's been worthwhile.

Now though I've got a meeting booked in with some clients about a joint campaign and the entire tone from the setup so far has been about how we can make these stupid idiots click on just about anything. This is going to be a hell of meeting as I try to explain why treating your staff as if they're destructive five year olds might not be the best long term strategy. Or why the tone of suggesting "company pay rise" or "extra holiday" only to say "Not Really, Suckers, and also you're stupid and here's some mandatory remedial training" might not go over as well as you think it will.

I don't think the problem is phishing simulations, I think it's 'leaders' with zero empathy.

Yeah, this is very true. The main issue with phishing campaigns is the same as "awareness" campaigns: they're just an easy way to do something that you can measure and check off the box about security for the year. If you actually manage to follow up with talking about why it's important and don't punish or shame people, it might have some (still small probably) effect, but often it's either just execute and report or execute, identify those that got got and punish.

Also if you reduced local admin rights, implemented separation of duties and MFA, that would do a lot more to protect against phishing.

Thanks Ants
May 21, 2004

#essereFerrari


The thing about phishing campaigns is that they require you to make a ton of exceptions so all their emails are delivered, meaning stuff that is pretending to come from your domain gets straight through into people's inboxes, and the "check it's not from an external source" thing that people have drilled into them no longer applies. Dinging someone for clicking a link in an email talking about them getting paid a bonus using language used within the organisation that the mail client is showing as a legit internal message is pointless.

cr0y
Mar 24, 2005



A few years back the security team at my place did an Obamacare market place lookalike thing and caused people to report legitimate emails as phishing attempts and inadvertently made a lot of people miss open enrollment.

Takes No Damage
Nov 20, 2004

The most merciful thing in the world, I think, is the inability of the human mind to correlate all its contents. We live on a placid island of ignorance in the midst of black seas of infinity, and it was not meant that we should voyage far.


Grimey Drawer

Thanks Ants posted:

Dinging someone for clicking a link in an email talking about them getting paid a bonus using language used within the organisation that the mail client is showing as a legit internal message is pointless.

This is one of the only ones that ever got me :argh: Now I just submit every email from my boss that's just something like 'hey go do this pls <link>' to our phishing team and ignore it until he follows up in person a week later.


SpartanIvy posted:

drat, I was just about to buy a license too....

ponzicar
Mar 17, 2008
My first week at my current job, I got a phishing test that had me scratching my head for a few minutes over how something so obviously fake got through our spam filters, then inspired me to create an Outlook rule that send anything with knowbe4 in the headers directly to its own special folder.

Famethrowa
Oct 5, 2012

our phishing awareness training once included references to phishing attacks pretending to raise money for Ukraine and created a shitstorm of accusations that we were promoting Russian propaganda.

nevermind that charity scams were traced to Russian APT groups :)

Mustache Ride
Sep 11, 2001



ponzicar posted:

My first week at my current job, I got a phishing test that had me scratching my head for a few minutes over how something so obviously fake got through our spam filters, then inspired me to create an Outlook rule that send anything with knowbe4 in the headers directly to its own special folder.

I did something similarly but it forwards the email to the infosec person in charge of the phish training with

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


ponzicar posted:

My first week at my current job, I got a phishing test that had me scratching my head for a few minutes over how something so obviously fake got through our spam filters, then inspired me to create an Outlook rule that send anything with knowbe4 in the headers directly to its own special folder.

I wonder if I could set up a rule that automatically forwards anything from our security vendor's phishing test address directly to IT and then deletes it.

Cold on a Cob
Feb 6, 2006

i've seen so much, i'm going blind
and i'm brain dead virtually

College Slice

Cup Runneth Over posted:

I wonder if I could set up a rule that automatically forwards anything from our security vendor's phishing test address directly to IT and then deletes it.

Yeah many of them use a header eg "If message header includes X-PHISHTEST then move to Phishing folder"

evil_bunnY
Apr 2, 2003

mllaneza posted:

I'm in a weird place as far as relationships with Security go.

The product owner for Security Governance gave me PowerShell code to disable the bad kind of TeamViewer that can dial in whenever a vendor wants to touch one of our lab systems. They won't unblock downloads.teamviewer.com, but we can support it in labs where it's part of the support contract for a $BIGBUCKS instrument.

The firewall people will deep dive in Splunk to help us diagnose weird network issues, screensharing Splunk sessions live while they're working on it. I have easy catalogue items to update firewall rules or exclude an external host from SSL MITM fuckery with certificates.

The people who manage our antivirus solutions will spend hours with us watching the consoles live while we're trying to keep fireeye from breaking janky vendor software. These people are in Europe and about 9 time zones ahead of us, but they'll go live with West Coast US people. I talked them in to creating a Lab Systems exceptions group, and on top of that gave them a list of AD OUs that only contained lab machines to automatically add our stuff to the group with the exceptions. They open tickets with the vendor when AV goes wild on the stuff I support. I send these people internal recognition awards a few times a year.

I expected all of these groups to default to "no". They don't, they want the work to get done, and they sincerely believe that they're here to add a layer of safety to the science. I'm blessed and I know it.
That's the way things are *supposed* to go but yeah count your loving blessings. The minute execs decide that's a cost center you'll be back to a dysfunctional nightmare.

cr0y posted:

A few years back the security team at my place did an Obamacare market place lookalike thing and caused people to report legitimate emails as phishing attempts and inadvertently made a lot of people miss open enrollment.
Come here, nice CTO, I've got a surprise for you, it's right behind the barn.

GrunkleStalin
Aug 13, 2021
I’ve spent the past 15 years as an IC/PM and now I’m responsible for hiring two Jr. Security Engineers. I have no idea what I’m doing and have vague goals like “improve security” and “automate” for my future team.
Do y’all have any advice on what to look for in a candidate?
Or how to build a team?
Or manage a team?

I’m so loving lost and in over my head.

i am a moron
Nov 12, 2020

"I think if there’s one thing we can all agree on it’s that Penn State and Michigan both suck and are garbage and it’s hilarious Michigan fans are freaking out thinking this is their natty window when they can’t even beat a B12 team in the playoffs lmao"
Well, first step is to take a deep breath. Managing people isn’t something you’re just going to figure out day 1. When you’re hiring, try to find people who you think will make average to good decisions without your input. This will cut down on having to get into the weeds with them. Since they’re juniors you’re going to have to either way, but less is better. Folks who value autonomy are usually the better folks to have around anyways.

Once you’ve hired some people, take another deep breath and just treat them like humans. Make sure you have a sane work intake/project management system. Read some books like this one: https://www.amazon.com/Managers-Pat...41-fda6b2cb1e77 but mostly just treat people like humans. Respond to what they need in ways that your organization has enabled you too. If they need more, ask your boss.

But seriously though baseline good management is just being a human and treating humans like humans. You’ll learn the rest as you go on.

Well Played Mauer
Jun 1, 2003

We'll always have Cabo
First Break All The Rules is a quick read that can help you get rolling by focusing on creating an environment where people can do their best work.

When you interview someone, especially juniors, they’re typically strong in one area but weak in others. Identify those strengths as best you can and try to build a team with different strengths that complement each other. Basically: don’t build a team of nine shortstops.

Also figure out what you want to teach and what you don’t want to teach. For example I can teach hard skills but don’t have the EQ to coach assholes even if they’re brilliant, so I bias hires toward people with natural communication skills and a desire to learn rather than raw technical horsepower.

Also you will gently caress up. Be transparent when you do and share more information about the job and the company than you think you should. The good hires will appreciate it.

Oh and try to hire people better/smarter than you. It makes your life much easier and clears you for upper management if that’s what you want because it shows you can identify talent and hire without making yourself irreplaceable at your current level.

BonHair
Apr 28, 2007

Be sure that the guys understand that you can't solve everything with automation, you gotta think a bit too. And also make sure they can talk to people, even in kinda hostile situations. You don't want introvert nerds who will break to any stupid demand unless you have someone to take all the battles for them. I dunno, try lightly teasing the candidates about their education or something and see if they fight back or just agree with your dumb opinions. But they also gotta be flexible, so don't get too arrogant young white men.

Sickening
Jul 16, 2007

Black summer was the best summer.

BonHair posted:

Be sure that the guys understand that you can't solve everything with automation, you gotta think a bit too. And also make sure they can talk to people, even in kinda hostile situations. You don't want introvert nerds who will break to any stupid demand unless you have someone to take all the battles for them. I dunno, try lightly teasing the candidates about their education or something and see if they fight back or just agree with your dumb opinions. But they also gotta be flexible, so don't get too arrogant young white men.

:yikes: When did this kind of posting become okay?

Wibla
Feb 16, 2011

BonHair posted:

Be sure that the guys understand that you can't solve everything with automation, you gotta think a bit too. And also make sure they can talk to people, even in kinda hostile situations. You don't want introvert nerds who will break to any stupid demand unless you have someone to take all the battles for them. I dunno, try lightly teasing the candidates about their education or something and see if they fight back or just agree with your dumb opinions. But they also gotta be flexible, so don't get too arrogant young white men.

The. What?

E: ok now that my brain has had some time to simmer down from that, here's some actual content: When you lead a team, they work for you, they're your people. Your job is to make them the best they can be, and to shield them from the inevitable bullshit that comes from (upper) management. If you take care of your people, they will take care of you.

BonHair
Apr 28, 2007

Okay, I made a bad post I guess, but can someone make me a better person by explaining why?

My point was that security involves doing something that will inconvenience other people, so if you're looking for candidates for a small team, it seems like a good skill to look for is ability to deal with conflicts.

Zorak of Michigan
Jun 10, 2006


BonHair posted:

Okay, I made a bad post I guess, but can someone make me a better person by explaining why?

My point was that security involves doing something that will inconvenience other people, so if you're looking for candidates for a small team, it seems like a good skill to look for is ability to deal with conflicts.

Junior people shouldn't be resolving conflicts, they should be identifying them and helping people initiate a process. They don't have the authority to make an an exception and they don't have the standing to force compliance, so asking them to resolve anything is waste of time and talent. The expectation should be that they provide people with information about security policy, identified vulnerabilities, exception policies, etc, and gather job experience while keeping the simple stuff off the desks of senior engineers and management.

Sickening
Jul 16, 2007

Black summer was the best summer.

BonHair posted:

Okay, I made a bad post I guess, but can someone make me a better person by explaining why?

My point was that security involves doing something that will inconvenience other people, so if you're looking for candidates for a small team, it seems like a good skill to look for is ability to deal with conflicts.

I do t buy this level of obliviousness.

i am a moron
Nov 12, 2020

"I think if there’s one thing we can all agree on it’s that Penn State and Michigan both suck and are garbage and it’s hilarious Michigan fans are freaking out thinking this is their natty window when they can’t even beat a B12 team in the playoffs lmao"

Well Played Mauer posted:


Also you will gently caress up. Be transparent when you do and share more information about the job and the company than you think you should. The good hires will appreciate it.

Really good advice. Also get ready to feel dirty when you can’t be transparent

CLAM DOWN
Feb 13, 2007




BonHair posted:

I dunno, try lightly teasing the candidates about their education or something and see if they fight back or just agree with your dumb opinions.

or maybe don't do this

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

BonHair posted:

Be sure that the guys understand that you can't solve everything with automation, you gotta think a bit too. And also make sure they can talk to people, even in kinda hostile situations. You don't want introvert nerds who will break to any stupid demand unless you have someone to take all the battles for them. I dunno, try lightly teasing the candidates about their education or something and see if they fight back or just agree with your dumb opinions. But they also gotta be flexible, so don't get too arrogant young white men.

Amazing troll, I gotta say.

“Use the extremely unbalanced power dynamic of an interview to make the candidate guess how you expect them to respond to a meta-stimulus of mocking.”

Defenestrategy
Oct 24, 2010

Hire people to do poo poo you dont want to do. Dont want to manage a siem? hire dudes who have siem experience. Dont want to do code analysis? Hire someone with that.

Edit: when my team expanded we made a matrix of all of our reaponsibilies and marked which ones we'd rather someone else do. Worked out.

Defenestrategy fucked around with this message at 20:21 on Aug 21, 2023

Adbot
ADBOT LOVES YOU

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA

Zorak of Michigan posted:

Junior people shouldn't be resolving conflicts, they should be identifying them and helping people initiate a process. They don't have the authority to make an an exception and they don't have the standing to force compliance, so asking them to resolve anything is waste of time and talent. The expectation should be that they provide people with information about security policy, identified vulnerabilities, exception policies, etc, and gather job experience while keeping the simple stuff off the desks of senior engineers and management.

On the flip side, lovely people in the org love to go directly to the most junior person they can find with the permissions needed to do the wildly dumb thing they want. I've worked with total doormats who would just get harangued until they folded, time and time again, even after coaching and being told 'if this person ever talks to you again, you get me RIGHT AWAY, understand?'.

I have no idea how the hell you'd figure out how likely someone is to fold like that in an interview without being a shithead though.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply